279
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Splitting versus lumping: narrowing a theory’s scope may increase its value

, &
Received 18 Mar 2022, Accepted 21 Apr 2023, Published online: 03 May 2023

References

  • Aahuja, M., Chudoba, K., Kacmar, C., Mcknight, H., & George, J. (2007). IT road warriors: Balancing work-family conflict, job autonomy, and work overload to mitigate turnover intentions. MIS Quarterly, 3(1), 1–17. https://doi.org/10.2307/25148778
  • Abia, W. A., Jato, D. M., Agejo, P. A., Abia, E. A., Njuacha, G. E., Amana, D. A., Akebe, L. K., Takang, A. S. J., & Ekuri, D. O. (2010). Cameroonian youths, their attractions to scamming and strategies to divert attention. International NGO Journal, 5(5), 110–116.
  • Aurigemma, S., & Mattson, T. (2019). Generally speaking, context matters: Making the case for a change from universal to particular ISP research. Journal of the Association for Information Systems, 20(12), 1700–1742. https://doi.org/10.17705/1jais.00583
  • Bala, H., & Venkatesh, V. (2013). Changes in employees’ job characteristics during an enterprise system implementation: A latent growth modeling perspective. MIS Quarterly, 37(4), 1113–1140. https://doi.org/10.25300/MISQ/2013/37.4.06
  • Burrell, J. (2008). Problematic empowerment: West African internet scams as strategic misrepresentation. Information Technologies & International Development, 4(4), 15–30. https://doi.org/10.1162/itid.2008.00024
  • Burton-Jones, A., McLean, E., & Monod, E. (2015). Theoretical perspectives in is research: From variance and process to conceptual latitude and conceptual fit. European Journal of Information Systems, 24(6), 664–679. https://doi.org/10.1057/ejis.2014.31
  • Cartwright, N. (1983). How the laws of physics lie. Clarendon Press.
  • Connors, J. M., Jurczak, W., Straus, D. J., Ansell, S. M., Kim, W. S., Gallamini, A., Younes, A., Alekseev, S., Illés, Á., Picardi, M., Lech-Maranda, E., Oki, Y., Feldman, T., Smolewski, P., Savage, K. J., Bartlett, N. L., Walewski, J., Chen, R., Ramchandren, R., and Zinzani, P. L. et al. (2018). Brentuximab vedotin with chemotherapy for stage III or IV Hodgkin’s lymphoma. The New England Journal of Medicine, 378(4), 331–344. https://doi.org/10.1056/NEJMoa1708984
  • Craver, C. (2009). Mechanisms and natural kinds. Philosophical Psychology, 22(5), 575–594. https://doi.org/10.1080/09515080903238930
  • Craver, C., & Bechtel, B. (2006). Mechanism. In J. Pfeifer & S. Sarkar (Eds.), The philosophy of science: An encyclopedia (pp. 469–478). Psychology Press.
  • Cummins, R. (2000). How does it work?” versus “what are the laws?”: Two conceptions of psychological explanation. In F. Keil & R. Wilson (Eds.), Explanation and cognition (pp. 117–144). MIT Press. https://doi.org/10.1093/acprof:osobl/9780199548033.003.0016
  • Darden, L. (1996). Generalization in biology. Studies in the History of the Philosophy of Science, 27(3), 409–419. https://doi.org/10.1016/0039-3681(95)00050-X
  • Darden, L. (2008). Thinking again about biological mechanisms. Philosophy of Science, 75(5), 958–969. https://doi.org/10.1086/594538
  • Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
  • Davison, R. M., & Martinsons, M. G. (2016). Context is king! Considering particularism in research design and reporting. Journal of Information Technology, 31(3), 241–249. https://doi.org/10.1057/jit.2015.19
  • Dobovšek, B., Lamberger, I., & Slak, B. (2013). Advance fee frauds messages – Non‐declining trend. Journal of Money Laundering Control, 16(3), 209–230. https://doi.org/10.1108/JMLC-04-2013-0012
  • Friedman, M. (Ed.). (1953). The methodology for positive economics. Essays in positive economics (pp. 3–34). University of Chicago Press.
  • Gregor, S. (2006). The nature of theory in information systems. MIS Quarterly, 30(3), 611–642. https://doi.org/10.2307/25148742
  • Hassan, N. R., & Lowry, P. B. (2015). Seeking middle-range theories in information systems research. International Conference on Information Systems, Fort Worth, the United States. (pp. 13–18). Association for Information Systems.
  • Hong, W., Chan, F., Thong, J., Chasalow, L., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111–136. https://doi.org/10.1287/isre.2013.0501
  • Islam, M. N., & Bouwman, H. (2016). Towards user-intuitive web interface sign design and evaluation: A semiotic framework. International Journal of Human-Computer Studies, 86, 121–137. https://doi.org/10.1016/j.ijhcs.2015.10.003
  • King, J., & Lyytinen, K. (2004). Reach and grasp. MIS Quarterly, 28(4), 539–551. https://doi.org/10.2307/25148654
  • Kitcher, P. (1981). Explanatory unification. Philosophy of Science, 48(4), 507–531. https://doi.org/10.1086/289019
  • Kuhn, T. S. (1970). Reflections on my critics. In I. Lakatos & A. Musgrave (Eds.), Criticism and the growth of knowledge (pp. 231–278). Cambridge University Press.
  • Laudan, L. (1971). William Whewell on the consilience of inductions. The Monist, 55(3), 368–391. https://doi.org/10.5840/monist197155318
  • Lee, A. (1989). A scientific methodology for MIS case studies. MIS Quarterly, 13(1), 33–50. https://doi.org/10.2307/248698
  • Lee, A., & Baskerville, R. (2003). Generalizing generalizability in information systems research. Information Systems Research, 14(3), 221–243. https://doi.org/10.1287/isre.14.3.221.16560
  • MacArthur, R., & Levins, R. (1964). Competition, habitat selection, and character displacement in a patchy environment. Proceedings of the National Academy of Sciences, 51(6), 1207–1210. https://doi.org/10.1073/pnas.51.6.1207
  • Mäki, U. (2009). Realistic realism about unrealistic models. In H. Kincaid & D. Ross (Eds.), The Oxford handbook of philosophy of economics (pp. 68–98). Oxford University Press.
  • Niiniluoto, I. (2016). Unification and confirmation. Theoria, 31(1), 107–123. https://doi.org/10.1387/theoria.13084
  • Pentland, B. T. (1999). Building process theory with narrative: From description to explanation. Academy of Management Review, 24(4), 711–724. https://doi.org/10.2307/259350
  • Rivard, S. (2014). Editor’s comments: The ions of theory construction. MIS Quarterly, 38(2), iii–xiv.
  • Rosenberg, A. (1999). Economic theory as political philosophy. The Social Science Journal, 36(4), 575–587. https://doi.org/10.1016/S0362-3319(99)00039-7
  • Salmon, W. (1981). Rational prediction. The British Journal for the Philosophy of Science, 32(2), 115–125. https://doi.org/10.1093/bjps/32.2.115
  • Schacter, D. L. (1996). Searching for memory: The brain, the mind, and the past. Basic Books.
  • Seddon, P., & Scheepers, R. (2012). Towards the improved treatment of generalization of knowledge claims in is research: Drawing general conclusions from samples. European Journal of Information Systems, 21(1), 6–21. https://doi.org/10.1057/ejis.2011.9
  • Siponen, M., & Baskerville, R. (2018). Intervention effect rates as a path to research relevance: Information systems security example. Journal of the Association for Information Systems, 19(4), 247–265. https://doi.org/10.17705/1jais.00491
  • Siponen, M., & Klaavuniemi, T. (2020). Why is the Hypothetico-Deductive (H-D) method in information systems not an H-D method. Information and Organizations, 30(1), 100287. https://doi.org/10.1016/j.infoandorg.2020.100287
  • Song, J., & Zahedi, F. (2001). Web design in e-commerce a theory and empirical analysis. International Conference on Information Systems, New Orleans, LA, 205–219.
  • Sudhakara, A. (2009). History of cancer, ancient and modern treatment methods. Journal of Cancer Science & Therapy, 1(2), 1–4. https://doi.org/10.4172/1948-5956.100000e2
  • Tan, B., Srinivasan, A., Lyytinen, K., & Grover, V. (2008). Contributing to rigorous and forward thinking explanatory theory. Journal of the Association for Information Systems, 9(2). https://doi.org/10.17705/1jais.00151
  • Tarute, A., Nikou, S., & Gatautis, R. (2017). Mobile application driven consumer
  • Thagard, P. (2010). Evolution, creation, and the philosophy of science. In Taylor, Roger S., Ferrari, Michel (Eds.), Epistemology and science education: Understanding the evolution vs. intelligent design controversy (pp. 20–37). Routledge.
  • Tsohou, A., Siponen, M., & Newman, M. (2020). How does information technology-based service degradation influence consumers’ use of services? An information technology-based service degradation decision theory. Journal of Information Technology, 35(1), 2–24. https://doi.org/10.1177/0268396219856019
  • van de Ven, A. H., & Poole, M. S. (1995). Explaining development and change in organizations. Academy of Management Review, 20(3), 510–540. https://doi.org/10.2307/258786
  • Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 7(3), 425–478. https://doi.org/10.2307/30036540
  • Weber, R. (2003). Theoretically speaking. MIS Quarterly, 27(3). iii–xi https://doi.org/10.2307/30036536.
  • Weber, R. (2012). Evaluating and developing theories in the information systems discipline. Journal of the Association for Information Systems, 13(1), 1–30. https://doi.org/10.17705/1jais.00284
  • Weinstein, N., Rothman, A., & Sutton, S. (1998). Stage theories of health behavior: Conceptual and methodological issues. Health Psychology, 17(3), 290–299. https://doi.org/10.1037/0278-6133.17.3.290
  • Whewell, W. (1840). The philosophy of the inductive sciences: Founded upon their history. JW Parker.
  • Wimsatt, W. (2007). Re-engineering philosophy for limited beings. Harvard University Press.
  • Xiao, Q., Siponen, M., Zhang, X., Lu, F., Chen, S., & Mao, M. (2022). Impacts of platform design on consumer commitment and online review intention: Does use context matter in dual-platform e-commerce? Internet Research, 32(5), 1496–1531. https://doi.org/10.1108/INTR-03-2021-0152
  • Ylikoski, P., & Kuorikoski, J. (2010). Dissecting explanatory power. Philosophical Studies: An International Journal for Philosophy in the Analytic Tradition, 148(2), 201–219. https://doi.org/10.1007/s11098-008-9324-z

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.